Remove 2008 Remove Manufacturing Remove Security Remove Vulnerability
article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 2: A list of incidents in the water industry (Ten, Liu & Manimaran, 2008) What I think is interesting about the list above is the details of who conducted the attack. Physical Security – Some systems may be secure within the plant. These links can be intercepted and are vulnerable to attack.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 2: A list of incidents in the water industry (Ten, Liu & Manimaran, 2008). Physical Security – Some systems may be secure within the plant. Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Covid-19: Elements of a Scenario

Emergency Planning

US Homeland Security Council 2005, UK Government 2008), while in others it did not. For example, civil aviation is particularly vulnerable. Thus, the vulnerability and fragility of people and society need to be seen in the light of socio-economic changes induced by the epidemic. US Homeland Security Council 2005.

Pandemic 130
article thumbnail

Haiti: has there been progress in disaster reduction since the last big earthquake?

Emergency Planning

This is impossible to substantiate, but goods manufactured in a donor country, brought to Haiti by transport from that country and distributed by personnel from the same country would do little to stimulate the Haitian economy. For example, in the 2008 hurricane season, four named storms arrived.